WS-2017-3772
Published:May 14, 2026
Updated:May 14, 2026
Regular Expression Denial of Service (ReDoS) vulnerability was found in underscore.string 2.4.0 through 3.3.5.
Affected Packages
underscore.string (CDN_JS):
Affected version(s) >=3.0.0 <3.3.6Fix Suggestion:
Update to version 3.3.6jsdom (CONDA):
Affected version(s) =11.0.0 <11.11.0Fix Suggestion:
Update to version 11.11.0grunt (CONDA):
Affected version(s) =1.0.4Fix Suggestion:
Update to version no_fixunderscore.string (NPM):
Affected version(s) >=3.0.0 <3.3.6Fix Suggestion:
Update to version 3.3.6entityframework.lookuptables (NUGET):
Affected version(s) >=1.1.12.119 <1.1.14.119Fix Suggestion:
Update to version 1.1.14.119newplatform.flexberry.designer.embercache (NUGET):
Affected version(s) =3.7.0-beta09Fix Suggestion:
Update to version no_fixtslint (NUGET):
Affected version(s) >=3.11.0 <4.5.1Fix Suggestion:
Update to version 4.5.1midiator.webclient (NUGET):
Affected version(s) >=1.0.98 <1.0.105Fix Suggestion:
Update to version 1.0.105ymcatwincities/openy-cibox-vm (PHP):
Affected version(s) =dev-master <dev-snyk-fix-d3e304fdb18d8e743e047d064f2eeebeFix Suggestion:
Update to version dev-snyk-fix-d3e304fdb18d8e743e047d064f2eeebeymcatwincities/openy-cibox-vm (PHP):
Affected version(s) =dev-snyk-upgrade-c10ea3c8666b5b22429d3e747ff879aa <dev-snyk-fix-5c35a6fcce9a99be5f2075759c8a3425Fix Suggestion:
Update to version dev-snyk-fix-5c35a6fcce9a99be5f2075759c8a3425xenomedia/xeno-base (PHP):
Affected version(s) >=0.0.3 <=0.0.4Fix Suggestion:
Update to version no_fixtribalsystems/zenario (PHP):
Affected version(s) >=9.2.57169 <9.5.x-devFix Suggestion:
Update to version 9.5.x-devtribalsystems/zenario (PHP):
Affected version(s) >=8.6.x-dev <8.9.55141Fix Suggestion:
Update to version 8.9.55141seidemann-web/wave-theme (PHP):
Affected version(s) =dev-motorrad <dev-omage-themeFix Suggestion:
Update to version dev-omage-themexenomedia/xeno-base (PHP):
Affected version(s) =dev-master <0.0.1Fix Suggestion:
Update to version 0.0.1limefamily/yii2-limetheme (PHP):
Affected version(s) >=1.0.0 <1.0.12Fix Suggestion:
Update to version 1.0.12oxid-esales/wave-theme (PHP):
Affected version(s) =dev-motorrad <dev-oxscript-google-analyticsFix Suggestion:
Update to version dev-oxscript-google-analyticsseidemann-web/wave-theme (PHP):
Affected version(s) =dev-bugfix/variants-fix <dev-fixUpLanguageConstantsFix Suggestion:
Update to version dev-fixUpLanguageConstantstribalsystems/zenario (PHP):
Affected version(s) >=9.0.x-dev <9.0.55141Fix Suggestion:
Update to version 9.0.55141ymcatwincities/openy-cibox-vm (PHP):
Affected version(s) >=dev-snyk-fix-19013f5e293df9c71f68bf9631fba9f2 <dev-snyk-fix-45a393004964497d68443389076d755aFix Suggestion:
Update to version dev-snyk-fix-45a393004964497d68443389076d755atriawarman/yii2-richfilemanager (PHP):
Affected version(s) >=dev-bckp-develop <v0.1Fix Suggestion:
Update to version v0.1seidemann-web/wave-theme (PHP):
Affected version(s) =dev-feature/WT-21Fix Suggestion:
Update to version no_fixsombrerodepaja/franky-skeleton-application (PHP):
Affected version(s) >=dev-dependabot/npm_and_yarn/engine.io-and-browser-sync-6.2.1 <=dev-dependabot/npm_and_yarn/qs-and-grunt-contrib-watch-6.4.1Fix Suggestion:
Update to version no_fixyivic/yivic-elce (PHP):
Affected version(s) >=dev-fixbug/TVNnWKJz-wp-elce-admin-options-header-error-styles-ui-again <=dev-origin/v1.0.1Fix Suggestion:
Update to version no_fixawesome-support/awesome-support (PHP):
Affected version(s) =dev-gas_php81_fixerror <dev-issue/233Fix Suggestion:
Update to version dev-issue/233tribalsystems/zenario (PHP):
Affected version(s) >=9.0.57473 <9.1.55143Fix Suggestion:
Update to version 9.1.55143frankyframework/franky2 (PHP):
Affected version(s) =dev-mainFix Suggestion:
Update to version no_fixseidemann-web/wave-theme (PHP):
Affected version(s) >=dev-WT-27/sticky-header <dev-WT-36/Sticky-Header-FixesFix Suggestion:
Update to version dev-WT-36/Sticky-Header-Fixestribalsystems/zenario (PHP):
Affected version(s) =dev-latest-public-release <7.0.2eFix Suggestion:
Update to version 7.0.2eRelated Resources (1)
Do you need more information?
Contact UsCVSS v4
Base Score:
8.7
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
NONE
Vulnerable System Integrity
NONE
Vulnerable System Availability
HIGH
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
7.5
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH